github.com-nsa-observer-documents_-_2015-03-24_11-40-29
Item Preview
Share or Embed This Item
Flag this item for
- Publication date
- 2015-03-24
TXT and PDF documents from the NSA
NSA Documents with OCR text version
Here is the complete list of PDF documents included
01302014-dagbladet-cop15interceptiondocument.pdf
01312014-cbc-csecairportwifi_tracking.pdf
2009-OIGReportonBulkCollection.pdf
2011-OIGReportonBulkCollection.pdf
20130605-guard-verizon215secondary_order.pdf
20130606-wapo-prism.pdf
20130608-guard-boundlessinformantcapabilities-(1).pdf
20130608-guard-boundlessinformantfaq.pdf
20130608-guard-prism.pdf
20130620-guard-702minimizationprocedures.pdf
20130620-guard-702targetingprocedures.pdf
20130627-guard-2007memoonusperson_metadata.pdf
20130627-guard-nsaoig2009_report.pdf
20130629-wapo-prism.pdf
20130630-guard-dropmire_.pdf
20130710-wapo-upstream.pdf
20130731-guard-xkeyscoretrainingslides.pdf
20130809-guard-702_glossary.pdf
20130816-wapo-sid_oversight.pdf
20130816-wapo-soyougotaus_person.pdf
20130816-wapo-ssonewsarticle.pdf
20130816-wapo-targeting_rationale.pdf
2013-08-30cryptomecongressionalbudget2013.pdf
20130830cryptomecongressionalbudget2013.pdf
20130903-globo-satc.pdf
20130905-guard-bullrun.pdf
20130905-guard-cryptanalysis_classification.pdf
20130905-guard-sigint_enabling.pdf
20130908-globo-stormbew_tv.pdf
20130908-globo-stormbrew_tv.pdf
20130908-globo-tv.pdf
20130909-spiegel-smartphones-(1).pdf
20130911-guard-israelsharing0.pdf
20130916-spiegel-creditcardtransactions.pdf
20130920-spiegel-belgacom.pdf
20130928-nyt-contact_chaining.pdf
20130928-nyt-syanpse.pdf
20131004-guard-egotistical_giraffe-(1).pdf
20131004-guard-iat_tor.pdf
20131004-guard-tor_stinks.pdf
20131004-wapo-gchq_mullenize.pdf
20131004-wapo-tor.pdf
20131014-wapo-collection_optimization.pdf
20131014-wapo-contentacquisitionoptimization1.pdf
20131014-wapo-contentacquisitionoptimization2.pdf
20131020-spiegel-mexican_president.pdf
20131021-monde-boundlessinformantfrance.pdf
20131021-monde-closeaccesssigads.pdf
20131021-monde-wanadoo_alcatel.pdf
20131022-monde-prismapril2013.pdf
20131024-guard-phonesworldleaders.pdf
20131025-monde-french_cyberattacks.pdf
20131027-spiegel-embassy.pdf
20131028-mundo-spain_collections-(1).pdf
20131028-mundo-spain_collections.pdf
20131030-wapo-muscular.pdf
20131030-wapo-muscular_smiley.pdf
20131101-guard-corporate_reporting.pdf
20131104-mundo-boundless_informant.pdf
20131104-mundo-infosharingpartners.pdf
20131104-nyt-collection_accesses.pdf
20131104-nyt-sigint_goals.pdf
20131104-nyt-sigintstrategicplan.pdf
20131104-wapo-optimization_google.pdf
20131104-wapo-sso_overview.pdf
20131104-wapo-windstop.pdf
20131117-guardian-dsd_3g.pdf
20131117-spiegel-royal_concierge.pdf
20131119-dagbladet-norwaycollection0.pdf
20131119-odni-agguidelinesfordomesticfbi_operations-(1).pdf
20131119-odni-interimcompetencytestforaccesstofisa_data.pdf
20131119-odni-nsacoreintelligenceoversighttraining.pdf
20131119-odni-nsacoursematerialsintrov.13.pdf
20131119-odni-nsacoursematerialsmodule1_v.17.pdf
20131119-odni-nsacoursematerialsmodule2_v.16.pdf
20131119-odni-nsacoursematerialsmodule3_v.22.pdf
20131119-odni-nsacoursematerialsmodule4v.28.pdf
20131119-odni-nsacoursematerialsmodule4_v.28.pdf
20131119-odni-nsacoursematerialsmodule5_v.24.pdf
20131119-odni-nsacoursematerialsmodule6analyticpersonal_v.18.pdf
20131119-odni-nsacoursematerialsmodule6techpersonnel_v.25.pdf
20131119-odni-nsacryptologicalschoolcourseslidesonlegalcomplianceandminimizationprocedures.pdf
20131119-odni-nsaguidancememoonlegalstandardsforsearchingbulk_metadata.pdf
20131119-odni-nsametadatacollectiontrainingslides_.pdf
20131119-odni-nsasummaryofrequirementsforcollectionofbulkmetadata.pdf
20131119-odni-officeofgeneralcouncilbusinessrecordanalysttrainingslides.pdf
20131119-odni-unitedstatessignalsintelligencedirective18appendix_j.pdf
20131119-odni-unitedstatessignalsintelligencedirective18jan252011.pdf
20131119-odni-verification_slide.pdf
20131120-guard-collectionprocessinganddisseminationofalliedcommunications.pdf
20131122-dagbladet-afghanistan_collection.pdf
20131122-dagbladet-boundlessinformantfaq.pdf
20131122-dagbladet-boundless_informant.pdf
20131123-nrc-nsa_malware.pdf
20131123-nyt-sigintstrategyfeb_2012.pdf
20131126-huffpo-radicalizers_pornography.pdf
20131126-wapo-microsoftcloudexploitation.pdf
20131126-wapo-microsoftmonkeypuzzle.pdf
20131130-GlobeandMail-csec-br-spy.pdf
20131202-cbc-g20.pdf
20131202-guard-dsd_data.pdf
20131204-wapo-chalkfun_foreignness.pdf
20131204-wapo-fascia-(1).pdf
20131204-wapo-fascia.pdf
20131205-espresso-italy_spying.pdf
20131205-svt-fra_russia.pdf
20131209-nyt-nsa_games.pdf
20131210-cbc-nsacsecpartnership-(1).pdf
20131210-cbc-nsacsecpartnership.pdf
20131210-wapo-cotraveler_overview.pdf
20131210-wapo-ghost_machine.pdf
20131210-wapo-gsmclassificationguide.pdf
20131210-wapo-location_cookies.pdf
20131210-wapo-target_location-(1).pdf
20131210-wapo-target_location.pdf
20131211-svt-accomplishmentsfromnsa.pdf
20131211-svt-baltic_region-(1).pdf
20131211-svt-baltic_region.pdf
20131211-svt-finalagendasweden_usa.pdf
20131211-svt-legalissuesukregardingswedenandquantum.pdf
20131211-svt-nsainternalpmonfra.pdf
20131211-svt-nsaslidesxkeyscore.pdf
20131211-svt-quantumfromgchq.pdf
20131211-svt-sweden_neutral.pdf
20131211-svt-xkeyscoreslidewithswedishexample.pdf
20131211-svt-xkeyscore_sources.pdf
20131211-svt-xkeyscoreswedenmeeting.pdf
20131223-wapo-nsacss-mission.pdf
20131230-appelbaum-nsaantcatalog.pdf
20131230-appelbaum-nsaantcatalo.pdf
20131230-spiegel-qfire.pdf
20131230-spiegel-tao_intro.pdf
20131230-spiegel-taoquantumtasking.pdf
20131230-spiegel-taoquantumtheory.pdf
2013-watchlist-guidance.pdf
20140102-wapo-quantumcomputershard_targets.pdf
20140102-wapo-quantum_computing.pdf
20140116-guard-dishfire_presentation.pdf
20140127-nbc-squeaky_dolphin.pdf
20140127-nyt-convergedanalysisonsmartphonedevices.pdf
20140127-nyt-mobilethemebriefing.pdf
20140128-guard-leakyphoneapps_0.pdf
20140128-guard-leakyphoneapps.pdf
20140130-informationdk-cop15interception_document.pdf
20140131-cbc-csecairportwifi_tracking.pdf
20140204-nbc-britishspiesattackedhactivistanonymous.pdf
20140207-nbc-gchqhoneytrapcyberattackbackgroundon_jtrig.pdf
20140207-nbc-gchqhoneytrapcyberattackleveragingforeignjournalistsvia_jtrig.pdf
20140207-nrc-boundless_nederland.pdf
20140211-intercept-dronesinterceptingcommunications.pdf
20140218-intercept-discoverysiginttargetingscenariosand_compliance.pdf
20140218-intercept-gchqsigdev.pdf
20140224-intercept-trainingforcovertonlineoperations.pdf
20140227-guard-gchq_optic.pdf
20140303-epic-dojreportonpenregisterfisaorders.pdf
20140305-nrc-dutchsharescollectedanti-piracyinformationwithnsa.pdf
20140307-intercept-nsaaskzeldaaninterviewwithzelda.pdf
20140307-intercept-nsaaskzeldaguiltyuntilproveninnocent.pdf
20140307-intercept-nsaaskzeldaisbaindesoleilabaneonthe_nsa.pdf
20140307-intercept-nsaaskzeldawatchingeverywordinsnitchcity.pdf
20140311-nyt-ashcroftmemoonintelligencesharing_procedures.pdf
20140311-nyt-classificationguideforfisatheprotectamericaactandthefisaamendmentsact.pdf
20140311-nyt-classificationguideforstellarwindprogram_0.pdf
20140311-nyt-nsamemoexpandsaccesstofisainformation.pdf
20140311-nyt-nsatimelineofsurveillancelaw_developments.pdf
20140312-intercept-fiveeyeshackinglargerouters.pdf
20140312-intercept-increasingcollectioncapacitybyincreasing_implants.pdf
20140312-intercept-mhsleveragesxkeyscoreforquantum.pdf
20140312-intercept-multiplemethodsof_quantum.pdf
20140312-intercept-nsaphishingtacticsandmaninthemiddleattacks.pdf
20140312-intercept-nsaselectortypes.pdf
20140312-intercept-nsatechnologydirectorateanalysisofconvergeddata.pdf
20140312-intercept-quantuminsertdiagrams.pdf
20140312-intercept-thensaandgchqsquantumtheoryhackingtactics.pdf
20140312-intercept-turbineandturmoil.pdf
20140312-intercept-turbineindustrialscale_exploitation.pdf
20140312-intercept-vpnandvoipexploitationwithhammerchantand_hammerstein.pdf
20140313-intercept-nsacooperativethirdpartyrelationships.pdf
20140315-intercept-turbineintelligencecommandandcontrol-(1).pdf
20140315-intercept-turbineintelligencecommandandcontrol-(2).pdf
20140315-intercept-turbineintelligencecommandandcontrol.pdf
20140318-wapo-addinganothercountrytomystic_program.pdf
20140318-wapo-descriptionofdatacollectionunder_mystic-(1).pdf
20140318-wapo-descriptionofdatacollectionunder_mystic.pdf
20140318-wapo-mystic_program.pdf
20140320-intercept-targetingsystemadministrator_accounts.pdf
20140321-lemonde-frenchintelligencee-mailspying_operation-(1).pdf
20140321-lemonde-frenchintelligencee-mailspying_operation.pdf
20140322-nyt-operationshotgiantobjectives.pdf
20140329-derspiegel-gchqandnsaspyonheadsofstate.pdf
20140404-intercept-2009sigdevconference.pdf
20140404-intercept-gchqfullspectrumcybereffects.pdf
20140430-intercept-gchq_visit.pdf
20140430-intercept-ghostmachine.pdf
20140430-intercept-prism_olympics.pdf
20140513-greenwald-noplacetohidedocuments.pdf
20140519-intercept-black_budget.pdf
20140519-intercept-dea_warfighter.pdf
20140519-intercept-mystic.pdf
20140519-intercept-somalget.pdf
20140519-intercept-ssodictionaryexcerpt.pdf
20140519-intercept-ssomysticcharts.pdf
20140531-nyt-identity-intelligence.pdf
20140610-cryptome-dea-nsa-sandkey.pdf
20140616-derspiegel-analyticsfortargetsineurope0.pdf
20140616-derspiegel-xkeyscorefingerprints_1.pdf
20140618-dagbladet-black_budget.pdf
20140618-dagbladet-keithalexandertalking_points.pdf
20140618-DerSpiegel-agendaforthevisitofbsivicepresidentandreaskonentothensa.pdf
20140618-derspiegel-boundlessinformantoverviewglobal.pdf
20140618-derspiegel-boundlessinformantstatisticsforso-calledthird_parties.pdf
20140618-derspiegel-boundlessinformantstatisticsondatafrom22foreignpartners22.pdf
20140618-derspiegel-boundlessinformantstatisticson_germany.pdf
20140618-derspiegel-boundlessinformantstatisticsontheuk.pdf
20140618-derspiegel-briefingonthevisittothensaofahigh-rankingbndofficial.pdf
20140618-derspiegel-cooperationbetweenthensabndand_bfv.pdf
20140618-derspiegel-detailsonxkeyscorefromaninternalgchqwebsite.pdf
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf
20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf
20140618-derspiegel-excerptonthesharingofxkeyscorewithgermanintelligenceagency_bfv.pdf
20140618-derspiegel-explanationofnymrodasystemforsearchingforpeopleandplacesindatabasesand_documents.pdf
20140618-derspiegel-faqsontheboundlessinformantprogram.pdf
20140618-derspiegel-finalagendaofameetingbetweenhigh-rankingnsaandbnd_officials.pdf
20140618-derspiegel-gchqreportonthetechnicalabilitiesoftempora.pdf
20140618-derspiegel-guidelinesfortheclassificationofnsasigintdetails_1945-1967.pdf
20140618-derspiegel-guidelinesfortheclassificationofsuslagdetailsandthensa-bnd_cooperation.pdf
20140618-DerSpiegel-internalnsadiscussionguidelinesrelatingtocooperationwiththebndand_bfv.pdf
20140618-derspiegel-internalnsapresentationonthebndsorganization0.pdf
20140618-derspiegel-logoofnsa-bndcooperation.pdf
20140618-derspiegel-nostalgicrecollectionsfromnsaworkersformerlystationedinbadaibling.pdf
20140618-derspiegel-nsacsseurope-reportontheexperiencesofonensaworker.pdf
20140618-derspiegel-nsacsspresentationontechnicalsurveillanceineuropeand_africa.pdf
20140618-derspiegel-nsapresentationontheworkof_nymrod-(1).pdf
20140618-derspiegel-nsapresentationontheworkof_nymrod.pdf
20140618-derspiegel-overviewoftheuseofboundlessinformantworld_map.pdf
20140618-derspiegel-preliminaryagendaofameetingbetweennsaandbndofficials.pdf
20140618-DerSpiegel-presentationonthensaciaunitspecialcollection_service.pdf
20140618-derspiegel-reportonannsasigdevtrainingcourseforalliedcountries_.pdf
20140618-derspiegel-reportonannsavisittobndsiteandondatatransferfromthebndtothensa.pdf
20140618-derspiegel-reportonanunexplodedordnancealarmateuropeantechnicalcentern.pdf
20140618-derspiegel-reportonanxkeyscoretrainingsessionattheeccdagger_complex.pdf
20140618-derspiegel-reportonawharpdriveincidentinansso_presentation.pdf
20140618-derspiegel-reportondataexchangebetweenthensaandbndwithinthejsa_framework.pdf
20140618-derspiegel-reportonthebeginningsoftheeuropeansecuritycenterescinthedaggercomplex.pdf
20140618-derspiegel-reportonthechangingoftheescsnametoeuropeansecurityoperationscenteresoc.pdf
20140618-derspiegel-reportonthensasaccessto_tempora.pdf
20140618-derspiegel-reportontheone-yearanniversaryofthensaliaisonunitsuslaginbadaibling.pdf
20140618-derspiegel-reportonthesurveillanceofafricancountriesby_jsa.pdf
20140618-derspiegel-reportonthetechnicalexpansionoftheeuropeantechnicalcenterinwiesbaden.pdf
20140618-derspiegel-reportontheworkofnsacss_europe.pdf
20140618-derspiegel-restrictionsonthetechnicalsurveillanceperformedbyjsa.pdf
20140618-derspiegel-ussiteswithnsapersonnelin_germany.pdf
20140618-derspiegel-worldmapfromtheboundlessinformant_program.pdf
20140618-DerSpiegel-zoomofaboundlessinformantdocumentwithprojectnames.pdf
20140630-WaPo-affidavitofkeithalexanderregardingspyingonforeignentities.pdf
20140630-WaPo-fisaamendmentsactsummarydocument_1.pdf
20140630-WaPo-fisajudgesorderauthorizingsurveillanceofforeigngovernmentsand_organizations.pdf
20140630-WaPo-listofgovernmentsandorganizationsauthorizedfor_surveillance.pdf
20140630-WaPo-odnicertificationregardingforeignentities.pdf
20140709-Intercept-spyingonmuslim-american_leaders.pdf
20140714-Intercept-jtrigall.pdf
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf
20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf
20140725-Intercept-Saudi-Arabia-Information-Paper.pdf
20140803-Intercept-Israel-US-1999-Agreement.pdf
20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf
20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf
20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf
20140815-Heise-HACIENDA-Program.pdf
20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf
20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf
20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf
20140825-Intercept-ICREACH-Black-Budget-Extract.pdf
20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf
20140825-Intercept-ICREACH-Wholesale-Sharing.pdf
20140825-Intercept-Metadata-Policy-Conference.pdf
20140825-Intercept-Metadata-Sharing-Memorandum.pdf
20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf
20140831-spiegel-collaborationinoverdrive.pdf
20140831-spiegel-iraqukloadsharingcarriers.pdf
20140831-spiegel-jordan_belgium.pdf
20140831-spiegel-kurdistanregionalgovernment.pdf
20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf
20140831-spiegel-nsaintelligencerelationshipwithturkey.pdf
20140831-spiegel-nsasoldestthirdpartypartnership-(1).pdf
20140831-spiegel-nsasoldestthirdpartypartnership.pdf
20140831-spiegel-sinioseminartoughtimesfor_turkey-(1).pdf
20140831-spiegel-sinioseminartoughtimesfor_turkey.pdf
20140831-spiegel-sinioseminarturkeyandthe_kurds.pdf
20140831-spiegel-sinioseminarturkish_elections.pdf
20140831-spiegel-turkeyandthe_pkk.pdf
20140831-spiegel-turkeyattheg20pre-meeting.pdf
20140831-spiegel-turkeyenergycompany_development.pdf
20140831-spiegel-turkishsignalintelligencechiefagenda.pdf
20140905-intercept-quadrennialintelligencecommunityreviewfinal_report.pdf
20140914-intercept-fergusonvisitprecis.pdf
20140914-intercept-keyactivitiesin_progress.pdf
20140914-intercept-speargunphaseone.pdf
20140914-intercept-speargun_underway.pdf
20140914-spiegel-satelliteteleportknowledge.pdf
20140914-spiegel-treasuremapannouncesanew_release-(1).pdf
20140914-spiegel-treasuremapannouncesanew_release.pdf
20140914-spiegel-treasuremappresentation-(1).pdf
20140914-spiegel-treasuremappresentation.pdf
20141010-intercept-cnocoresecretssecuritystructure.pdf
20141010-intercept-cnocoresecretsslideslices.pdf
20141010-intercept-computernetworkexploitationclassificationguide.pdf
20141010-intercept-eci_compartments.pdf
20141010-intercept-ecipawleysclassification_guide.pdf
20141010-intercept-eciwhipgenieclassification_guide.pdf
20141010-intercept-exceptionallycontrolledinformation_listing.pdf
20141010-intercept-sentryeaglebrief_sheet.pdf
20141010-intercept-tarexclassificationguide.pdf
20141125-sueddeutsche-access_breakdown.pdf
20141125-sz-cablemasterlist_ac.pdf
20141125-sz-cablemasterlist_fea.pdf
20141125-sz-cable_regions.pdf
20141125-sz-cablesnocurrent_access.pdf
20141125-sz-cableswherewe_are.pdf
20141125-sz-cableswherewewantto_be.pdf
20141125-sz-cneendpointproject_load.pdf
20141125-sz-mtiaccessprojectweeklystatusfebruary6_2009.pdf
20141125-sz-mtiaccessprojectweeklystatusjune27_2008.pdf
20141125-sz-mtiaccessprojectweeklystatusnovember28_2008.pdf
20141125-sz-partner_cables.pdf
20141125-sz-ptc_glossary.pdf
20141125-sz-windstopsystemhighlights.pdf
20141204-intercept-auroragoldprojectoverview.pdf
20141204-intercept-auroragoldtargettechnologytrendscentersupporttowpmo0.pdf
20141204-intercept-auroragoldworkingaid.pdf
20141204-intercept-auroragoldworkinggroup.pdf
20141204-intercept-ir21atechnologywarningmechanism_0.pdf
20141204-intercept-nsafirstevercollectofhighinterest4gcellular_signal.pdf
20141204-intercept-nsagchqcsecnetworktradecraft_advancement.pdf
20141204-intercept-opulantpupencryption_attack.pdf
20141204-intercept-wolframiteencryptionattack-(1).pdf
20141204-intercept-wolframiteencryptionattack.pdf
20141214-intercept-gchqautomatednoc_detection.pdf
20141214-intercept-gchq_hopscotch.pdf
20141214-intercept-gchqmakingnetworksenseoftheencryption.pdf
20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf
20141214-intercept-gchqnacreviewapriljune_2011.pdf
20141214-intercept-gchqnacreviewjanuarymarch_2012.pdf
20141214-intercept-gchqnacreviewjulysept_2011.pdf
20141214-intercept-gchqnacreviewoctoberdecember_2011.pdf
20141214-intercept-gchqstargatecne_requirements.pdf
20141228-speigel-analysisfromssl-tlsconnectionsthroughgchqintheflyingpigdatabase_0.pdf
20141228-speigel-analyticchallengesfromactive-passiveintegrationwhennsaattacksipsecvpns0.pdf
20141228-speigel-analyticsonsecurityoftorhiddenservices_0.pdf
20141228-speigel-apotentialtechniquetodeanonymiseusersofthetornetwork0.pdf
20141228-speigel-bluesnortprogramonnetdefensefromencryptedcommunications0.pdf
20141228-speigel-canadiandocumentfromcesontlstrends_0.pdf
20141228-speigel-classificationguideforcryptanalysis0.pdf
20141228-speigel-decryptionofvpnconnectionswithinthevaliantsurfprogram0.pdf
20141228-speigel-descriptionofexistingprojectsonvpndecryption_0.pdf
20141228-spiegel-descriptionofvoiptelephonyencryptionmethodsandotherwaystoattack.pdf
20141228-spiegel-descriptionontheprocessingofvpndatapacketswithintheturmoil_program.pdf
20141228-spiegel-explanationofapotentialtechniquetodeanonymiseusersofthetor_network.pdf
20141228-spiegel-explanationofthegallantwavethatdecryptsvpntrafficwithin_longhaul.pdf
20141228-spiegel-explanationofthepoisennutproductanditsrolewhenattackingvpn.pdf
20141228-spiegel-explanationofthetransformengineemulatorwhenattackingvpn.pdf
20141228-spiegel-explanationoftheturmoilgallantwaveprogramanditsrolewhenattackingvpn0.pdf
20141228-spiegel-explanationonthespin9programonend-to-endattackson_vpn.pdf
20141228-spiegel-gchqbriefingonthebullrun_program.pdf
20141228-spiegel-gchqpresentationonthebullrunprogramsdecryption_capabilities.pdf
20141228-spiegel-generaldescriptionhownsahandlesencryptedtraffic.pdf
20141228-spiegel-guideforanalystsonhowtousetheprismskypecollection.pdf
20141228-spiegel-interceptwithotrencryptedchat.pdf
20141228-spiegel-interceptwithpgpencryptedmessage.pdf
20141228-spiegel-introtothevpnexploitationprocessmentioningtheprotocolsattacked-pptpipsecsslssh.pdf
20141228-spiegel-malibuarchitectureoverviewtoexploitvpncommunication.pdf
20141228-spiegel-nationalinformationassuranceresearchlaboratoryniarl_tundra.pdf
20150117-speigel-analysisofchinesemethodsandperformedactionsinthecontextofcomputernetwork_exploitation.pdf
20150117-speigel-classificationguideforcomputernetworkexploitationcne.pdf
20150117-speigel-combinationofoffensiveanddefensivemissions-howfourth-partymissionsarebeingperformed.pdf
20150117-speigel-csecdocumentabouttherecognitionoftrojansandothernetworkbasedanomaly.pdf
20150117-speigel-csecdocumentonthehandlingofexistingtrojanswhentrojanizingcomputers.pdf
20150117-speigel-documentabouttheexpansionoftheremoteoperationscenterroconendpointoperations.pdf
20150117-speigel-documentexplainingtheroleoftheremoteoperationscenter_roc.pdf
20150117-spiegel-nsaexamplesnowglobeinwhichasuspectedfrenchgovernmenttrojanisanalyzedtofindoutifitcanbehelpfulforowninterests_0.pdf
20150117-spiegel-nsafourthpartyaccess-idrinkyourmilkshake_.pdf
20150117-spiegel-nsaprogramtutelagetoinstrumentalizethirdpartyattacktools.pdf
20150117-spiegel-nsaprojectdescriptiontorecognizeandprocessdatathatcomesfromthirdpartyattackson_computers.pdf
20150117-spiegel-nsatrainingcoursematerialoncomputernetwork_operations-(1).pdf
20150117-spiegel-nsatrainingcoursematerialoncomputernetwork_operations.pdf
20150117-spiegel-overviewofmethodsfornsaintegratedcyberoperations0.pdf
20150117-spiegel-overviewofthetransgressionprogramtoanalyzeandexploitforeigncna-cne_exploits.pdf
20150117-spiegel-overviewonthensauseofbotsandthedefiantwarriorprogram.pdf
20150117-spiegel-processanalystschoosetheirdatarequirementandthengettoknowthetoolsthatcandothejob0.pdf
20150117-spiegel-projectsofthetao-atodepartmentsuchastheremotedestructionofnetworkcards.pdf
20150117-spiegel-quantumtheoryisasetoftechnologiesallowingman-on-the-sideinterferenceattacksontcp-ipconnectionsincludesstraightbizarreanddaredev.pdf
20150117-spiegel-reportofannsaemployeeaboutabackdoorintheopenssh_daemon.pdf
20150117-spiegel-samplecodeofamalwareprogramfromthefiveeyesalliance.pdf
20150117-spiegel-supply-chaininterdiction-stealthytechniquescancracksomeofsigintshardest_targets.pdf
20150117-spiegel-technicaldescriptionofthefashioncleftprotocol.pdf
20150117-spiegel-thefashioncleftprotocolnsausestoexfiltratedatafromtrojansandimplantstothensa_0.pdf
20150128-cbc-csepresentationonthelevitation_project.pdf
20150128-intercept-csepresentationonthelevitation_project.pdf
20150204-intercept-lovelyhorse0.pdf
20150204-intercept-natocivilianintelligencecouncilcyber_panel.pdf
20150204-intercept-opensourceforcyberdefence_progress.pdf
20150204-intercept-whoelseistargetingyourtargetcollecting.pdf
20150210-intercept-irancurrenttopics-interactionswithgchq.pdf
20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf
20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf
20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf
20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf
20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf
20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf
20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf
20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf
20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf
20150219-Intercept-PCS-Harvesting-At-Scale.pdf
20150219-Intercept-Where-are-These-Keys.pdf
ambassadesFrance.pdf
blackhat-Alexander-keynote.pdf
bullrun-briefing-sheet-from-gchq.pdf
ccne-email-addresses-jan10-mar10-trial.pdf
ccne-email-harvesting-jan10-mar10-trial.pdf
ccne-stats-summaries-jan10-mar10-trial.pdf
ccne-successes-jan10-mar10-trial.pdf
CLEANED004.-Cover_Memo-Sealed.pdf
CLEANED007.-CongNotificationInfoMemoSSCI10Apr_09-Sealedpdf.pdf
CLEANED032.-Basket2-NSAtraining.log.pdf
CLEANED096.-NSAsummaryofBRrequirements(maybeFeb_2009)-.pdf
CLEANEDFinal-USSIDSP0018Annex_J.pdf
CLEANEDFinal-USSID_SP0018.pdf
CLEANEDPRTT-1.pdf
CLEANEDPRTT-2.pdf
cne-access-to-core-mobile-networks.pdf
csec-br-spy.pdf
dapino-gamma-cne-presence-wiki.pdf
dapino-gamma-gemalto-yuaawaa-wiki.pdf
dapino-gamma-target-personalisation-centres.pdf
discovery-sigint-targeting-scenarios-and.pdf
doc-6-cyber-threat-capabilities.pdf
doj-nsa-memo.pdf
doody.pdf
dsd-3g.pdf
ericsson_reply.pdf
europebriefingnote_en.pdf
eyeswideopen_v1.pdf
FAA-CertificationRenewalswith_Caveats.pdf
FAA-Certification-Renewals-with-Caveats.pdf
FAA-Minimization_Procedures.pdf
FAA-Minimization-Procedures.pdf
FAA-Targeting_Procedures.pdf
FISC-Order,BR06-12.pdf
FISC-Order,-BR-06-12.pdf
gchq-g20-spy.pdf
gchq-mullenize.pdf
gchq-royal-concierge-de.pdf
gchq-se-fra-quantum-3.pdf
General-AlexanderLetterreNSAFactSheetInaccuracy.pdf
General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf
identity-intelligence.pdf
i-hunt-sys-admins.pdf
imsis-identified-with-ki-data-for-network.pdf
invisibility-report-9-0-final.pdf
jtrigall.pdf
Judge-WaltonAnswerstoQuestionsre_FISC.pdf
Judge-Walton-Answers-to-Questions-re-FISC.pdf
Lesson-4-SoyougotUSPerson_Information.pdf
lettertocompanies.pdf
media-34093.pdf
media-35509.pdf
media-35510.pdf
media-35511.pdf
media-35512.pdf
media-35513.pdf
media-35514.pdf
media-35515.pdf
media-35516.pdf
media-35517.pdf
media-35518.pdf
media-35519.pdf
media-35520.pdf
media-35521.pdf
media-35522.pdf
media-35523.pdf
media-35524.pdf
media-35525.pdf
media-35526.pdf
media-35527.pdf
media-35528.pdf
media-35529.pdf
media-35530.pdf
media-35531.pdf
media-35532.pdf
media-35533.pdf
media-35534.pdf
media-35535.pdf
media-35536.pdf
media-35537.pdf
media-35538.pdf
media-35539.pdf
media-35540.pdf
media-35541.pdf
media-35542.pdf
media-35543.pdf
media-35544.pdf
media-35545.pdf
media-35546.pdf
media-35547.pdf
media-35548.pdf
media-35549.pdf
media-35550.pdf
media-35551.pdf
media-35552.pdf
media-35653.pdf
media-35654.pdf
media-35655.pdf
media-35656.pdf
media-35657.pdf
media-35658.pdf
media-35659.pdf
media-35661.pdf
media-35662.pdf
media-35663.pdf
media-35664.pdf
media-35665.pdf
media-35666.pdf
media-35667.pdf
media-35668.pdf
media-35669.pdf
media-35670.pdf
media-35671.pdf
media-35672.pdf
media-35673.pdf
media-35674.pdf
media-35675.pdf
media-35676.pdf
media-35677.pdf
media-35678.pdf
media-35680.pdf
media-35681.pdf
media-35682.pdf
media-35683.pdf
media-35684.pdf
media-35685.pdf
media-35686.pdf
media-35687.pdf
media-35688.pdf
media-35689.pdf
nokia_reply.pdf
no-place-to-hide.pdf
nsa-5-eyes-partners.pdf
nsa-5-eyes-spy-g20-dk.pdf
nsa-boundless-informant-faq.pdf
NSA-BoundlessInformantFrequentlyAskedQuestions.pdf
NSA-Boundless-Informant-Frequently-Asked-Questions.pdf
nsa-boundlessinformant-no-33m.pdf
nsa-boundless-informant.pdf
NSA-BoundlessInformantPowerpoint_Slides.pdf
nsa-boundless-informant-slides.pdf
nsa-bullrun-2-16-guardian-13-0905.pdf
nsa-bullrun-brief-nyt-13-0905.pdf
nsa-bullrun-brief-propublica-13-0905.pdf
nsabullrun.pdf
nsa-cable-spy-types.pdf
nsa-catalog-appelbaum.pdf
nsa-chalkfun.pdf
nsa-close-access-sigads.pdf
nsa-cotraveler.pdf
nsa-cryptanalysis-2-12-guardian-13-0905.pdf
nsa-csec-partners.pdf
nsa-css-mission.pdf
nsa-dutch-sigint.pdf
nsa-egotisticalgiraffe.pdf
nsa-fascia.pdf
nsa-finance-spy-de.pdf
nsa-fisa-certification.pdf
nsa-fisa-minimization.pdf
nsa-fisa-targeting.pdf
nsa-g8-g20-spying-02.pdf
nsa-g8-g20-spying.pdf
nsa-gchq-fra-quantum.pdf
nsa-gchq-se-fra-comint.pdf
nsa-gchq-spy-games.pdf
nsa-ghost-machine.pdf
nsa-gsm-tracking.pdf
nsa-hosts-fr-spies.pdf
nsa-iat-tor.pdf
NSA-IG_Report.pdf
nsa-israel-spy.pdf
NSA-MemotoDOD-ProposedAmendmenttoConductAnalysisofMetadata.pdf
NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf
nsa-microsoft-cloud-exploit.pdf
NSA-MissionsAuthoritiesOversightandPartnerships.pdf
NSA-Missions-Authorities-Oversight-and-Partnerships.pdf
nsa-muslim-porn.pdf
nsa-overcollection.pdf
nsa-ppd-20.pdf
nsa-prism-13-1021.pdf
nsa-prism-dk.pdf
nsa-prism-guardian-13-1101.pdf
nsa-quantum-computer-2.pdf
nsa-quantum-computer.pdf
nsa-quantum-tasking.pdf
nsa-quantumtheory.pdf
nsa-scissors-2.pdf
nsa-scissors.pdf
NSA-Section702andSection215_Factsheets.pdf
NSA-Section-702-and-Section-215-Factsheets.pdf
NSA-Section702'Loop_Hole'.pdf
nsa-se-fra-quantum-2.pdf
nsa-se-fra-relationship.pdf
nsa-se-fra-ru-baltic.pdf
nsa-se-fra-spying-agenda.pdf
nsa-se-fra-xkeyscore.pdf
nsa-se-fra-xkeyscore-slide.pdf
nsa-se-spies.pdf
nsa-sigint-cryptologic-platform.pdf
nsa-sigint-enabling-guardian-13-0905.pdf
nsa-sigint-enabling-nyt-13-0905.pdf
nsa-sigint-enabling-propublica-13-0905.pdf
nsa-sigint-strategic-mission-2007.pdf
nsa-sigint-strategic-mission-2013.pdf
nsa-sigint-strategy-2012-2016.pdf
nsa-sigint-successes.pdf
nsa-smartphones-analysis.pdf
nsa-smartphones.pdf
nsa-sms-exploit.pdf
nsa-spy-games.pdf
nsa-sso1-guardian-13-1101.pdf
nsa-sso2-guardian-13-1101.pdf
nsa-sso-content.pdf
nsa-sso-dk.pdf
nsa-sso-overview.pdf
nsa-sso-slides.pdf
nsa-stellar-wind.pdf
nsa-tao-ant.pdf
nsa-tao-ant-pdf.pdf
nsa-tao-intro.pdf
nsa-target-location.pdf
nsa-tor.pdf
nsa-tor-stinks.pdf
nsa-verizon-spy.pdf
nsa-wanadoo-alcatel.pdf
nsa-windstop-muscular-incenser.pdf
nsa-windstop.pdf
nsa-xkeyscore.pdf
NSA-XKeyscore_Powerpoint.pdf
NSA-XKeyscore-Powerpoint.pdf
nsa-xkeyscore-sources.pdf
nsa-xkeyscore-tor-slides.pdf
nsa-yahoo-google-exploit.pdf
pcs-harvesting-at-scale.pdf
phonesgchq.pdf
phonesnsa.pdf
PRISM-OverviewPowerpointSlides.pdf
PRISM-Overview-Powerpoint-Slides.pdf
PRISM-PowerpointSlidesreDataAcquisition.pdf
PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf
psychology-a-new-kind-of-sigdev.pdf
rcs-9-admin-final.pdf
rcs-9-analyst-final.pdf
rcs-9-sysadmin-final.pdf
rcs-9-technician-final.pdf
remote-control-system-9-0-changelog-final.pdf
remote-control-system-9-1-changelog-final.pdf
samsungreply2.pdf
samsung_reply.pdf
saudi-arabia-information-paper.pdf
Section-215-ObamaAdministrationWhite_Paper.pdf
Section-215---Obama-Administration-White-Paper.pdf
Section-215-Primary_Order.pdf
Section-215---Primary-Order.pdf
Section-215-SecondaryOrder-_Verizon.pdf
Section-215---Secondary-Order---Verizon.pdf
SID-OversightandCompliance.pdf
SID-Oversight-and-Compliance.pdf
sigint-enabling-project2.pdf
sigint-enabling-project.pdf
spy-budget-fy13.pdf
Targeting-Rationale-TAR.pdf
Targeting-Rationale---TAR.pdf
the-art-of-deception-training-for-a-new.pdf
the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf
turbine-and-turmoil.pdf
UPSTREAM-Powerpoint_Slide.pdf
UPSTREAM-Powerpoint-Slide.pdf
vpn-and-voip-exploitation-with-hammerchant.pdf
WhatWeNeedtoLearnfromSnowden.pdf
where-are-these-keys.pdf
Wyden-Udall-LetteronNSAFactSheet_Inaccuracy.pdf
Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf
To restore the repository download the bundle nsa-observer-documents_-_2015-03-24_11-40-29.bundle and run:
git clone nsa-observer-documents_-_2015-03-24_11-40-29.bundle -b master
Source: https://github.com/nsa-observer/documents
Uploader: nsa-observer
Upload date: 2015-03-24
- Addeddate
- 2017-08-20 13:08:04
- Identifier
- github.com-nsa-observer-documents_-_2015-03-24_11-40-29
- Originalurl
- https://github.com/nsa-observer/documents
- Pushed_date
- 2015-03-24 11:40:29
- Scanner
- Internet Archive Python library 1.7.1
- Uploaded_with
- iagitup - v1.1
- Year
- 2015